IEEE Conference on Computer Communications, INFOCOM 2014


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

A unified framework for wireless max-min utility optimization with general monotonic constraints

Yao-Win Peter Hong, Chee Wei Tan, Liang Zheng, Cheng-Lin Hsieh, Chia-Han Lee

A unified framework for wireless max-min utility optimization with general monotonic constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Personal clouds: Sharing and integrating networked resources to enhance end user experiences

Minsung Jang, Karsten Schwan, Ketan Bhardwaj, Ada Gavrilovska, Adhyas Avasthi

Personal clouds: Sharing and integrating networked resources to enhance end user experiences

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling multicast traffic with deadlines in wireless networks

Kyu Seob Kim, Chih-Ping Li, Eytan Modiano

Scheduling multicast traffic with deadlines in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems

Pengfei Chen, Yong Qi, Pengfei Zheng, Di Hou

CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficiently collecting histograms over RFID tags

Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu

Efficiently collecting histograms over RFID tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance-aware energy optimization on mobile devices in cellular network

Yong Cui, Shihan Xiao, Xin Wang, Minming Li, Hongyi Wang, Zeqi Lai

Performance-aware energy optimization on mobile devices in cellular network

Details
Discussion Comments: 0
Verification: Authors have not verified information

A matroid theory approach to multicast network coding

Xunrui Yin, Zongpeng Li, Xin Wang

A matroid theory approach to multicast network coding

Details
Discussion Comments: 0
Verification: Authors have not verified information

On designing neighbor discovery protocols: A code-based approach

Tong Meng, Fan Wu, Guihai Chen

On designing neighbor discovery protocols: A code-based approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Critical sensing range for mobile heterogeneous camera sensor networks

Yitao Hu, Xinbing Wang, Xiaoying Gan

Critical sensing range for mobile heterogeneous camera sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

An optimal data collection technique for improved utility in UAS-aided networks

Ahmed E. A. A. Abdulla, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, Fumie Ono, Ryu Miura

An optimal data collection technique for improved utility in UAS-aided networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Communication through collisions: Opportunistic utilization of past receptions

Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr

Communication through collisions: Opportunistic utilization of past receptions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility

Jiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang

Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving mobile video streaming with link aware scheduling and client caches

Randeep Bhatia, T. V. Lakshman, Arun N. Netravali, Krishan K. Sabnani

Improving mobile video streaming with link aware scheduling and client caches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards ubiquitous indoor localization service leveraging environmental physical features

Yang Tian, Ruipeng Gao, Kaigui Bian, Fan Ye, Tao Wang, Yizhou Wang, Xiaoming Li

Towards ubiquitous indoor localization service leveraging environmental physical features

Details
Discussion Comments: 0
Verification: Authors have not verified information

Walking down the STAIRS: Efficient collision resolution for wireless sensor networks

Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu

Walking down the STAIRS: Efficient collision resolution for wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Venice: Reliable virtual data center embedding in clouds

Qi Zhang, Mohamed Faten Zhani, Maissa Jabri, Raouf Boutaba

Venice: Reliable virtual data center embedding in clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

How to identify global trends from local decisions? Event region detection on mobile networks

Andreas Loukas, Marco Zuniga, Ioannis Protonotarios, Jie Gao

How to identify global trends from local decisions? Event region detection on mobile networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Double auctions for dynamic spectrum allocation

Wei Dong, Swati Rallapalli, Lili Qiu, K. K. Ramakrishnan, Yin Zhang

Double auctions for dynamic spectrum allocation

Details
Discussion Comments: 0
Verification: Authors have not verified information

FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver

Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, Swetha Shivaramaiah

FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ready, Set, Go: Coalesced offloading from mobile devices to the cloud

Liyao Xiang, Shiwen Ye, Yuan Feng, Baochun Li, Bo Li

Ready, Set, Go: Coalesced offloading from mobile devices to the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics

Vinay Joseph, Sem C. Borst, Martin I. Reiman

Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics

Details
Discussion Comments: 0
Verification: Authors have not verified information

BlueID: A practical system for Bluetooth device identification

Jun Huang, Wahhab Albazrqaoe, Guoliang Xing

BlueID: A practical system for Bluetooth device identification

Details
Discussion Comments: 0
Verification: Authors have not verified information

Frogeye: Perception of the slightest tag motion

Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li

Frogeye: Perception of the slightest tag motion

Details
Discussion Comments: 0
Verification: Authors have not verified information

Power consumption of virtual machines with network transactions: Measurement and improvements

Ryan Shea, Haiyang Wang, Jiangchuan Liu

Power consumption of virtual machines with network transactions: Measurement and improvements

Details
Discussion Comments: 0
Verification: Authors have not verified information

Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach

Jun Huang, Guoliang Xing, Gang Zhou

Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online load balancing for MapReduce with skewed data input

Yanfang Le, Jiangchuan Liu, Funda Ergün, Dan Wang

Online load balancing for MapReduce with skewed data input

Details
Discussion Comments: 0
Verification: Authors have not verified information

iBeam: Intelligent client-side multi-user beamforming in wireless networks

Yongjiu Du, Ehsan Aryafar, Joseph Camp, Mung Chiang

iBeam: Intelligent client-side multi-user beamforming in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a system theoretic approach to wireless network capacity in finite time and space

Florin Ciucu, Ramin Khalili, Yuming Jiang, Liu Yang, Yong Cui

Towards a system theoretic approach to wireless network capacity in finite time and space

Details
Discussion Comments: 0
Verification: Authors have not verified information

Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic

Guangchi Liu, Qing Yang, Honggang Wang, Xiaodong Lin, Mike P. Wittie

Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic

Details
Discussion Comments: 0
Verification: Authors have not verified information

SimCast: Efficient video delivery in MU-MIMO WLANs

Guanhua Wang, Kaishun Wu, Qian Zhang, Lionel M. Ni

SimCast: Efficient video delivery in MU-MIMO WLANs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fault tolerant barrier coverage for wireless sensor networks

Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang

Fault tolerant barrier coverage for wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analysis and detection of SIMbox fraud in mobility networks

Ilona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia

Analysis and detection of SIMbox fraud in mobility networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

"Wireless networks without edges": Dynamic radio resource clustering and user scheduling

Yuhuan Du, Gustavo de Veciana

"Wireless networks without edges": Dynamic radio resource clustering and user scheduling

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

TOC: Localizing wireless rechargeable sensors with time of charge

Yuanchao Shu, Peng Cheng, Yu Gu, Jiming Chen, Tian He

TOC: Localizing wireless rechargeable sensors with time of charge

Details
Discussion Comments: 0
Verification: Authors have not verified information

A stable fountain code mechanism for peer-to-peer content distribution

Cédric Westphal

A stable fountain code mechanism for peer-to-peer content distribution

Details
Discussion Comments: 0
Verification: Author has not verified information

Structure-aware stochastic load management in smart grids

Yu Zhang, Mihaela van der Schaar

Structure-aware stochastic load management in smart grids

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed opportunistic scheduling for wireless networks powered by renewable energy sources

Hang Li, Chuan Huang, Shuguang Cui, Junshan Zhang

Distributed opportunistic scheduling for wireless networks powered by renewable energy sources

Details
Discussion Comments: 0
Verification: Authors have not verified information

Geometric evaluation of survivability of disaster-affected network with probabilistic failure

Hiroshi Saito

Geometric evaluation of survivability of disaster-affected network with probabilistic failure

Details
Discussion Comments: 0
Verification: Author has not verified information

Energy efficient Wifi tethering on a smartphone

Kyoung-Hak Jung, Yuepeng Qi, Chansu Yu, Young-Joo Suh

Energy efficient Wifi tethering on a smartphone

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards performance-centric fairness in datacenter networks

Li Chen, Yuan Feng, Baochun Li, Bo Li

Towards performance-centric fairness in datacenter networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters

Liuhua Chen, Haiying Shen

Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks

Bo Gao, Yaling Yang, Jung-Min "Jerry" Park

A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust uncoded video transmission over wireless fast fading channel

Hao Cui, Chong Luo, Chang Wen Chen, Feng Wu

Robust uncoded video transmission over wireless fast fading channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol

Hassan Aboubakr Omar, Weihua Zhuang, Li Li

On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application-level scheduling with deadline constraints

Huasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang

Application-level scheduling with deadline constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

A high-order Markov chain based scheduling algorithm for low delay in CSMA networks

Jaewook Kwak, Chul-Ho Lee, Do Young Eun

A high-order Markov chain based scheduling algorithm for low delay in CSMA networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

ForeSight: Mapping vehicles in visual domain and electronic domain

Dong Li, Zhixue Lu, Tarun Bansal, Erik Schilling, Prasun Sinha

ForeSight: Mapping vehicles in visual domain and electronic domain

Details
Discussion Comments: 0
Verification: Authors have not verified information

When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds

Shengbo Chen, Yin Sun, Ulas C. Kozat, Longbo Huang, Prasun Sinha, Guanfeng Liang, Xin Liu, Ness B. Shroff

When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

GHz-wide sensing and decoding using the sparse Fourier transform

Haitham Hassanieh, Lixin Shi, Omid Abari, Ezzeldin Hamed, Dina Katabi

GHz-wide sensing and decoding using the sparse Fourier transform

Details
Discussion Comments: 0
Verification: Authors have not verified information

LP-relaxation based distributed algorithms for scheduling in wireless networks

Chandramani Singh, Angelia Nedic, R. Srikant

LP-relaxation based distributed algorithms for scheduling in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

MIMO-based jamming resilient communication in wireless networks

Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou

MIMO-based jamming resilient communication in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the design and analysis of Data Center Network architectures for interconnecting dual-port servers

Dawei Li, Jie Wu

On the design and analysis of Data Center Network architectures for interconnecting dual-port servers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal privacy-preserving energy management for smart meters

Lei Yang, Xu Chen, Junshan Zhang, H. Vincent Poor

Optimal privacy-preserving energy management for smart meters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links

Yan Li, Haibo Zhang, Zhiyi Huang, Michael Albert

Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links

Details
Discussion Comments: 0
Verification: Authors have not verified information

Max-flow min-cut theorem and faster algorithms in a circular disk failure model

Yusuke Kobayashi, Kensuke Otsuki

Max-flow min-cut theorem and faster algorithms in a circular disk failure model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deep packet inspection with DFA-trees and parametrized language overapproximation

Daniel Luchaup, Lorenzo De Carli, Somesh Jha, Eric Bach

Deep packet inspection with DFA-trees and parametrized language overapproximation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Low complexity multi-resource fair queueing with bounded delay

Wei Wang, Ben Liang, Baochun Li

Low complexity multi-resource fair queueing with bounded delay

Details
Discussion Comments: 0
Verification: Authors have not verified information

Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation

Wei Gong, Kebin Liu, Xin Miao, Haoxiang Liu

Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Epidemic thresholds with external agents

Siddhartha Banerjee, Avhishek Chatterjee, Sanjay Shakkottai

Epidemic thresholds with external agents

Details
Discussion Comments: 0
Verification: Authors have not verified information

TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing

Zhenni Feng, Yanmin Zhu, Qian Zhang, Lionel M. Ni, Athanasios V. Vasilakos

TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Near-pri: Private, proximity based location sharing

Edmund Novak, Qun Li

Near-pri: Private, proximity based location sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage

Jing Zhang, Xiangke Liao, Shanshan Li, Yu Hua, Xue Liu, Bin Lin

Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances

Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Gokhan Sahin, Chunming Qiao

Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances

Details
Discussion Comments: 0
Verification: Authors have not verified information

An overlay automata approach to regular expression matching

Alex X. Liu, Eric Torng

An overlay automata approach to regular expression matching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach

Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic

Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards automatic phone-to-phone communication for vehicular networking applications

Shaohan Hu, Hengchang Liu, Lu Su, Hongyan Wang, Tarek F. Abdelzaher, Pan Hui, Wei Zheng, Zhiheng Xie, John A. Stankovic

Towards automatic phone-to-phone communication for vehicular networking applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient public integrity checking for cloud data sharing with multi-user modification

Jiawei Yuan, Shucheng Yu

Efficient public integrity checking for cloud data sharing with multi-user modification

Details
Discussion Comments: 0
Verification: Authors have not verified information

LiFi: Line-Of-Sight identification with WiFi

Zimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu

LiFi: Line-Of-Sight identification with WiFi

Details
Discussion Comments: 0
Verification: Authors have not verified information

What scale of audience a campaign can reach in what price on Twitter?

Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang

What scale of audience a campaign can reach in what price on Twitter?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Routing games with progressive filling

Tobias Harks, Martin Hoefer, Kevin Schewior, Alexander Skopalik

Routing games with progressive filling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving differential privacy of data disclosure in the smart grid

Jing Zhao, Taeho Jung, Yu Wang, Xiangyang Li

Achieving differential privacy of data disclosure in the smart grid

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-lateral privacy-preserving localization in pervasive environments

Tao Shu, Yingying Chen, Jie Yang, Albert Williams

Multi-lateral privacy-preserving localization in pervasive environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling in a secure wireless network

Xuan Wang, Yi Chen, Lin Cai, Jianping Pan

Scheduling in a secure wireless network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Throughput-efficient channel allocation in multi-channel cognitive vehicular networks

You Han, Eylem Ekici, Haris Kremo, Onur Altintas

Throughput-efficient channel allocation in multi-channel cognitive vehicular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cellular multi-coverage with non-uniform rates

Omer Gurewitz, Yakov Sandomirsky, Gabriel Scalosub

Cellular multi-coverage with non-uniform rates

Details
Discussion Comments: 0
Verification: Authors have not verified information

COLLECTOR: A secure RFID-enabled batch recall protocol

Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu

COLLECTOR: A secure RFID-enabled batch recall protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data-driven traffic flow analysis for vehicular communications

Yang Wang, Liusheng Huang, Tianbo Gu, Hao Wei, Kai Xing, Junshan Zhang

Data-driven traffic flow analysis for vehicular communications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable user selection for MU-MIMO networks

Xiufeng Xie, Xinyu Zhang

Scalable user selection for MU-MIMO networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling efficient access control with dynamic policy updating for big data in the cloud

Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang

Enabling efficient access control with dynamic policy updating for big data in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Electronic frog eye: Counting crowd using WiFi

Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, Zhiping Jiang

Electronic frog eye: Counting crowd using WiFi

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hybrid data pricing for network-assisted user-provided connectivity

Lin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas

Hybrid data pricing for network-assisted user-provided connectivity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem

Vikram P. Munishwar, Vinay Kolar, Nael B. Abu-Ghazaleh

Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dominant resource fairness in cloud computing systems with heterogeneous servers

Wei Wang, Baochun Li, Ben Liang

Dominant resource fairness in cloud computing systems with heterogeneous servers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Video delivery over heterogeneous cellular networks: Optimizing cost and performance

Konstantinos Poularakis, George Iosifidis, Antonios Argyriou, Leandros Tassiulas

Video delivery over heterogeneous cellular networks: Optimizing cost and performance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Will cyber-insurance improve network security? A market analysis

Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui

Will cyber-insurance improve network security? A market analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software Defined Monitoring of application protocols

Lukas Kekely, Viktor Pus, Jan Korenek

Software Defined Monitoring of application protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

kBF: A Bloom Filter for key-value storage with an application on approximate state machines

Sisi Xiong, Yanjun Yao, Qing Cao, Tian He

kBF: A Bloom Filter for key-value storage with an application on approximate state machines

Details
Discussion Comments: 0
Verification: Authors have not verified information

DAWN: Defending against wormhole attacks in wireless network coding systems

Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak

DAWN: Defending against wormhole attacks in wireless network coding systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Utility-based cooperative decision in cooperative authentication

Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang

Utility-based cooperative decision in cooperative authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic pricing and profit maximization for the cloud with geo-distributed data centers

Jian Zhao, Hongxing Li, Chuan Wu, Zongpeng Li, Zhizhong Zhang, Francis C. M. Lau

Dynamic pricing and profit maximization for the cloud with geo-distributed data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimizing makespan and total completion time in MapReduce-like systems

Yuqing Zhu, Yiwei Jiang, Weili Wu, Ling Ding, Ankur Teredesai, Deying Li, Wonjun Lee

Minimizing makespan and total completion time in MapReduce-like systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mining checkins from location-sharing services for client-independent IP geolocation

Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Di Zhang, Xiaoming Fu, K. K. Ramakrishnan

Mining checkins from location-sharing services for client-independent IP geolocation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated dynamic offset applied to cell association

Majed Haddad, Habib B. A. Sidi, Piotr Wiecek, Eitan Altman

Automated dynamic offset applied to cell association

Details
Discussion Comments: 0
Verification: Authors have not verified information

Profit-maximizing incentive for participatory sensing

Tie Luo, Hwee-Pink Tan, Lirong Xia

Profit-maximizing incentive for participatory sensing

Details
Author Comments: We strongly encourage the reader to refer to the journal version (ACM TIST 2016; http://dx.doi.org/10.1145/2837029) of this paper. It is much more digestible yet rigorous, and is thoroughly evaluated.
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Fluctuation analysis of debt based policies for wireless networks with hard delay constraints

Rahul Singh, I-Hong Hou, P. R. Kumar

Fluctuation analysis of debt based policies for wireless networks with hard delay constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Keep Forwarding: Towards k-link failure resilient routing

Baohua Yang, Junda Liu, Scott Shenker, Jun Li, Kai Zheng

Keep Forwarding: Towards k-link failure resilient routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks

Ashikur Rahman, Nael B. Abu-Ghazaleh

On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic resource provisioning in cloud computing: A randomized auction approach

Linquan Zhang, Zongpeng Li, Chuan Wu

Dynamic resource provisioning in cloud computing: A randomized auction approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Delay-throughput tradeoff with correlated mobility of ad-hoc networks

Shuochao Yao, Xinbing Wang, Xiaohua Tian, Qian Zhang

Delay-throughput tradeoff with correlated mobility of ad-hoc networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting malicious HTTP redirections using trees of user browsing activity

Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci

Detecting malicious HTTP redirections using trees of user browsing activity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Packet classification using binary Content Addressable Memory

Alex X. Liu, Chad R. Meiners, Eric Torng

Packet classification using binary Content Addressable Memory

Details
Discussion Comments: 0
Verification: Authors have not verified information

Trade-offs in optimizing the cache deployments of CDNs

Syed Hasan, Sergey Gorinsky, Constantine Dovrolis, Ramesh K. Sitaraman

Trade-offs in optimizing the cache deployments of CDNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks

Tsung Ying Wu, Wanjiun Liao, Cheng-Shang Chang

CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Information diffusion in mobile social networks: The speed perspective

Zongqing Lu, Yonggang Wen, Guohong Cao

Information diffusion in mobile social networks: The speed perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beyond the MDS bound in distributed cloud storage

Jian Li, Tongtong Li, Jian Ren

Beyond the MDS bound in distributed cloud storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Open peering by Internet transit providers: Peer preference or peer pressure?

Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis

Open peering by Internet transit providers: Peer preference or peer pressure?

Details
Discussion Comments: 0
Verification: Authors have not verified information

RIAL: Resource Intensity Aware Load balancing in clouds

Liuhua Chen, Haiying Shen, Karan Sapra

RIAL: Resource Intensity Aware Load balancing in clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Interference-aware proportional fairness for multi-rate wireless networks

Douglas M. Blough, Giovanni Resta, Paolo Santi

Interference-aware proportional fairness for multi-rate wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Compressive sensing over strongly connected digraph and its application in traffic monitoring

Xiao Qi, Yongcai Wang, Yuexuan Wang, Liwen Xu

Compressive sensing over strongly connected digraph and its application in traffic monitoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes

Liang Zhang, Weijie Wu, Dan Wang

Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes

Details
Discussion Comments: 0
Verification: Authors have not verified information

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices

Jun Shao, Rongxing Lu, Xiaodong Lin

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

POST: Exploiting dynamic sociality for mobile advertising in vehicular networks

Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li

POST: Exploiting dynamic sociality for mobile advertising in vehicular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel quality

Wei-Cheng Kuo, Chih-Chun Wang

Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel quality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cooperative repair with minimum-storage regenerating codes for distributed storage

Jun Li, Baochun Li

Cooperative repair with minimum-storage regenerating codes for distributed storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications

Jeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra

Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Signaling free localization of node failures in all-optical networks

János Tapolcai, Lajos Rónyai, Éva Hosszu, Pin-Han Ho, Suresh Subramaniam

Signaling free localization of node failures in all-optical networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach

Dong-Hoon Shin, Shibo He, Junshan Zhang

Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties

Xukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient distributed query processing in large RFID-enabled supply chains

Jia Liu, Bin Xiao, Kai Bu, Lijun Chen

Efficient distributed query processing in large RFID-enabled supply chains

Details
Discussion Comments: 0
Verification: Authors have not verified information

INDAPSON: An incentive data plan sharing system based on self-organizing network

Tuo Yu, Zilong Zhou, Da Zhang, Xinbing Wang, Yunxin Liu, Songwu Lu

INDAPSON: An incentive data plan sharing system based on self-organizing network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Interference coordination strategies for content update dissemination in LTE-A

Vincenzo Sciancalepore, Vincenzo Mancuso, Albert Banchs, Shmuel Zaks, Antonio Capone

Interference coordination strategies for content update dissemination in LTE-A

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves

Markus Forster, Raphaël Frank, Mario Gerla, Thomas Engel

A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Stochastic information management for voltage regulation in smart distribution systems

Hao Liang, Atef Abdrabou, Weihua Zhuang

Stochastic information management for voltage regulation in smart distribution systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling of multicast and unicast services under limited feedback by using rateless codes

Yin Sun, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff

Scheduling of multicast and unicast services under limited feedback by using rateless codes

Details
Discussion Comments: 0
Verification: Authors have not verified information

A college admissions game for uplink user association in wireless small cell networks

Walid Saad, Zhu Han, Rong Zheng, Mérouane Debbah, H. Vincent Poor

A college admissions game for uplink user association in wireless small cell networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing

Cong Wang, Bingsheng Zhang, Kui Ren, Janet Meiling Wang Roveda, Chang Wen Chen, Zhen Xu

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spatio-temporal factorization of log data for understanding network events

Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto

Spatio-temporal factorization of log data for understanding network events

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing the achievable throughput in wireless networks with two active RF chains

Yang Yang, Bo Chen, Kannan Srinivasan, Ness B. Shroff

Characterizing the achievable throughput in wireless networks with two active RF chains

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software defined green data center network with exclusive routing

Dan Li, Yunfei Shang, Congjie Chen

Software defined green data center network with exclusive routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission

Jiajue Ou, Yuanqing Zheng, Mo Li

MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving k-anonymity in privacy-aware location-based services

Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li

Achieving k-anonymity in privacy-aware location-based services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Safe Charging for wireless power transfer

Haipeng Dai, Yunhuai Liu, Guihai Chen, Xiaobing Wu, Tian He

Safe Charging for wireless power transfer

Details
Discussion Comments: 0
Verification: Authors have not verified information

SBVLC: Secure barcode-based visible light communication for smartphones

Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang

SBVLC: Secure barcode-based visible light communication for smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring bundling sale strategy in online service markets with network effects

Weijie Wu, Richard T. B. Ma, John C. S. Lui

Exploring bundling sale strategy in online service markets with network effects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure cooperative spectrum sensing and access against intelligent malicious behaviors

Wei Wang, Lin Chen, Kang G. Shin, Lingjie Duan

Secure cooperative spectrum sensing and access against intelligent malicious behaviors

Details
Discussion Comments: 0
Verification: Authors have not verified information

A robust information source estimator with sparse observations

Kai Zhu, Lei Ying

A robust information source estimator with sparse observations

Details
Discussion Comments: 0
Verification: Authors have not verified information

"Can you SEE me now?" A measurement study of mobile video calls

Chenguang Yu, Yang Xu, Bo Liu, Yong Liu

"Can you SEE me now?" A measurement study of mobile video calls

Details
Discussion Comments: 0
Verification: Authors have not verified information

Separating wheat from chaff: Winnowing unintended prefixes using machine learning

Andra Lutu, Marcelo Bagnulo, Jesús Cid-Sueiro, Olaf Maennel

Separating wheat from chaff: Winnowing unintended prefixes using machine learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid

Fanxin Kong, Chuansheng Dong, Xue Liu, Haibo Zeng

Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid

Details
Discussion Comments: 0
Verification: Authors have not verified information

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data

Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed stochastic optimization via correlated scheduling

Michael J. Neely

Distributed stochastic optimization via correlated scheduling

Details
Discussion Comments: 0
Verification: Author has not verified information

User mobility from the view of cellular data networks

Ying Zhang

User mobility from the view of cellular data networks

Details
Discussion Comments: 0
Verification: Author has not verified information

Enabling crowd-sourced mobile Internet access

George Iosifidis, Lin Gao, Jianwei Huang, Leandros Tassiulas

Enabling crowd-sourced mobile Internet access

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heterogeneity-aware data regeneration in distributed storage systems

Yan Wang, Dongsheng Wei, Xunrui Yin, Xin Wang

Heterogeneity-aware data regeneration in distributed storage systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding

Peng Guo, Jiannong Cao, Kui Zhang, Xuefeng Liu

Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP)

Mehdi Malboubi, Liyuan Wang, Chen-Nee Chuah, Puneet Sharma

Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP)

Details
Discussion Comments: 0
Verification: Authors have not verified information

R2D2: Embracing device-to-device communication in next generation cellular networks

Tarun Bansal, Karthikeyan Sundaresan, Sampath Rangarajan, Prasun Sinha

R2D2: Embracing device-to-device communication in next generation cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy optimization through traffic aggregation in wireless networks

Wenjie Hu, Guohong Cao

Energy optimization through traffic aggregation in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

ProWord: An unsupervised approach to protocol feature word extraction

Zhuo Zhang, Zhibin Zhang, Patrick P. C. Lee, Yunjie Liu, Gaogang Xie

ProWord: An unsupervised approach to protocol feature word extraction

Details
Discussion Comments: 0
Verification: Authors have not verified information

PLAM: A privacy-preserving framework for local-area mobile social networks

Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao

PLAM: A privacy-preserving framework for local-area mobile social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

SAP: Similarity-aware partitioning for efficient cloud storage

Bharath Balasubramanian, Tian Lan, Mung Chiang

SAP: Similarity-aware partitioning for efficient cloud storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Power grid vulnerability to geographically correlated failures - Analysis and control implications

Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman

Power grid vulnerability to geographically correlated failures - Analysis and control implications

Details
Discussion Comments: 0
Verification: Authors have not verified information

LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams

Qun Huang, Patrick P. C. Lee

LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal delay bound for maximum weight scheduling policy in wireless networks

Cem Boyaci, Ye Xia

Optimal delay bound for maximum weight scheduling policy in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A longitudinal analysis of Internet rate limitations

João Taveira Araújo, Raul Landa, Richard G. Clegg, George Pavlou, Kensuke Fukuda

A longitudinal analysis of Internet rate limitations

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Multirate multicast: Optimal algorithms and implementation

Georgios S. Paschos, Chih-Ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis

Multirate multicast: Optimal algorithms and implementation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks

François Baccelli, Bartlomiej Blaszczyszyn, Chandramani Singh

Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A stochastic game for privacy preserving context sensing on mobile phone

Wei Wang, Qian Zhang

A stochastic game for privacy preserving context sensing on mobile phone

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed backup scheduling: Modeling and optimization

Peter M. van de Ven, Bo Zhang, Angela Schörgendorfer

Distributed backup scheduling: Modeling and optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards adaptive continuous scanning in large-scale RFID systems

Haoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, Wenbo He

Towards adaptive continuous scanning in large-scale RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Monitor placement for maximal identifiability in network tomography

Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

Monitor placement for maximal identifiability in network tomography

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed learning for utility maximization over CSMA-based wireless multihop networks

Hyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi

Distributed learning for utility maximization over CSMA-based wireless multihop networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Restorable logical topology in the face of no or partial traffic demand knowledge

Reuven Cohen, Gabi Nakibly

Restorable logical topology in the face of no or partial traffic demand knowledge

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

CityDrive: A map-generating and speed-optimizing driving system

Yiran Zhao, Yang Zhang, Tuo Yu, Tianyuan Liu, Xinbing Wang, Xiaohua Tian, Xue Liu

CityDrive: A map-generating and speed-optimizing driving system

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scaling laws for secrecy capacity in cooperative wireless networks

Mahtab Mirmohseni, Panagiotis Papadimitratos

Scaling laws for secrecy capacity in cooperative wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Price of Anarchy in network routing with class based capacity guarantees

Ehsan Monsef, Tricha Anjali, Sanjiv Kapoor

Price of Anarchy in network routing with class based capacity guarantees

Details
Discussion Comments: 0
Verification: Authors have not verified information

Contextual localization through network traffic analysis

Aveek K. Das, Parth H. Pathak, Chen-Nee Chuah, Prasant Mohapatra

Contextual localization through network traffic analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

A mean field game approach to scheduling in cellular systems

Mayank Manjrekar, Vinod Ramaswamy, Srinivas Shakkottai

A mean field game approach to scheduling in cellular systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-efficient capacity optimization in wireless networks

Lu Liu, Xianghui Cao, Yu Cheng, Lili Du, Wei Song, Yu Wang

Energy-efficient capacity optimization in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

TorWard: Discovery of malicious traffic over Tor

Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu

TorWard: Discovery of malicious traffic over Tor

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bloom tree: A search tree based on Bloom filters for multiple-set membership testing

MyungKeun Yoon, JinWoo Son, Seon-Ho Shin

Bloom tree: A search tree based on Bloom filters for multiple-set membership testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

SoCast: Social ties based cooperative video multicast

Yang Cao, Xu Chen, Tao Jiang, Junshan Zhang

SoCast: Social ties based cooperative video multicast

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bounded stretch geographic homotopic routing in sensor networks

Kan Huang, Chien-Chun Ni, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell

Bounded stretch geographic homotopic routing in sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses

Lei Zhang, Boyang Yu, Jianping Pan

GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses

Details
Discussion Comments: 0
Verification: Authors have not verified information

From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks

Peng-Jun Wan, Zhu Wang, Lei Wang, Zhiguo Wan, Sai Ji

From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing offline access to social network content on mobile devices

Ngoc Minh Do, Ye Zhao, Shu-Ting Wang, Cheng-Hsin Hsu, Nalini Venkatasubramanian

Optimizing offline access to social network content on mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

IP fast rerouting for multi-link failures

Theodore Elhourani, Abishek Gopalan, Srinivasan Ramasubramanian

IP fast rerouting for multi-link failures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rippler: Delay injection for service dependency detection

Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel

Rippler: Delay injection for service dependency detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure cloud storage meets with secure network coding

Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow

Secure cloud storage meets with secure network coding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective

Marco Chiesa, Guy Kindler, Michael Schapira

Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical DCB for improved data center networks

Brent Stephens, Alan L. Cox, Ankit Singla, John B. Carter, Colin Dixon, Wes Felter

Practical DCB for improved data center networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint

Dong Zhao, Xiang-Yang Li, Huadong Ma

How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying

Liyang Zhang, Zhangyu Guan, Tommaso Melodia

Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks

Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, Wenjing Lou

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

ShopProfiler: Profiling shops with crowdsourcing data

Xiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu, Siyuan Liu, Lionel M. Ni

ShopProfiler: Profiling shops with crowdsourcing data

Details
Discussion Comments: 0
Verification: Authors have not verified information

New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants

Haiying Shen, Zhuozhao Li

New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Loss differentiation: Moving onto high-speed wireless LANs

Ruwaifa Anwar, Kamran Nishat, Mohsin Ali, Zahaib Akhtar, Haseeb Niaz, Ihsan Ayyub Qazi

Loss differentiation: Moving onto high-speed wireless LANs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes

Hongxing Li, Nitin Vaidya

Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Probability distribution of spectral hole duration in cognitive networks

Jelena V. Misic, Vojislav B. Misic

Probability distribution of spectral hole duration in cognitive networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A new efficient physical layer OFDM encryption scheme

Fei Huo, Guang Gong

A new efficient physical layer OFDM encryption scheme

Details
Discussion Comments: 0
Verification: Authors have not verified information

Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle

Stefano Basagni, Ladislau Bölöni, Petrika Gjanci, Chiara Petrioli, Cynthia A. Phillips, Danila Turgut

Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint power optimization of data center network and servers with correlation analysis

Kuangyu Zheng, Xiaodong Wang, Li Li, Xiaorui Wang

Joint power optimization of data center network and servers with correlation analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the catalyzing effect of randomness on the per-flow throughput in wireless networks

Florin Ciucu, Jens B. Schmitt

On the catalyzing effect of randomness on the per-flow throughput in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improved structures for data collection in wireless sensor networks

Jon Crowcroft, Michael Segal, Liron Levin

Improved structures for data collection in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hello: A generic flexible protocol for neighbor discovery

Wei Sun, Zheng Yang, Keyu Wang, Yunhao Liu

Hello: A generic flexible protocol for neighbor discovery

Details
Discussion Comments: 0
Verification: Authors have not verified information

Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks

Pengfei Hu, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu

Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward optimal allocation of location dependent tasks in crowdsensing

Shibo He, Dong-Hoon Shin, Junshan Zhang, Jiming Chen

Toward optimal allocation of location dependent tasks in crowdsensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

3D surface localization with terrain model

Yang Yang, Miao Jin, Hongyi Wu

3D surface localization with terrain model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling social network relationships via t-cherry junction trees

Brian Proulx, Junshan Zhang

Modeling social network relationships via t-cherry junction trees

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones

Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Greenbench: A benchmark for observing power grid vulnerability under data-centric threats

Mingkui Wei, Wenye Wang

Greenbench: A benchmark for observing power grid vulnerability under data-centric threats

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-objective data placement for multi-cloud socially aware services

Lei Jiao, Jun Li, Wei Du, Xiaoming Fu

Multi-objective data placement for multi-cloud socially aware services

Details
Discussion Comments: 0
Verification: Authors have not verified information

EasyBid: Enabling cellular offloading via small players

Zhixue Lu, Prasun Sinha, R. Srikant

EasyBid: Enabling cellular offloading via small players

Details
Discussion Comments: 0
Verification: Authors have not verified information

TideWatch: Fingerprinting the cyclicality of big data workloads

Dan Williams, Shuai Zheng, Xiangliang Zhang, Hani Jamjoom

TideWatch: Fingerprinting the cyclicality of big data workloads

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Parallel Identification Protocol for RFID systems

Linghe Kong, Liang He, Yu Gu, Min-You Wu, Tian He

A Parallel Identification Protocol for RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

LBSNSim: Analyzing and modeling location-based social networks

Wei Wei, Xiaojun Zhu, Qun Li

LBSNSim: Analyzing and modeling location-based social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proactive fault-tolerant aggregation protocol for privacy-assured smart metering

Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao

Proactive fault-tolerant aggregation protocol for privacy-assured smart metering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Let's stay together: Towards traffic aware virtual machine placement in data centers

Xin Li, Jie Wu, Shaojie Tang, Sanglu Lu

Let's stay together: Towards traffic aware virtual machine placement in data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks

Ulas C. Kozat, Guanfeng Liang, Koray Kokten

On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Is it worth to be patient? Analysis and optimization of delayed mobile data offloading

Fidan Mehmeti, Thrasyvoulos Spyropoulos

Is it worth to be patient? Analysis and optimization of delayed mobile data offloading

Details
Discussion Comments: 0
Verification: Authors have not verified information

A unified approach to the performance analysis of caching systems

Valentina Martina, Michele Garetto, Emilio Leonardi

A unified approach to the performance analysis of caching systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints

Vinay Setty, Gunnar Kreitz, Guido Urdaneta, Roman Vitenberg, Maarten van Steen

Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

PS-TRUST: Provably secure solution for truthful double spectrum auctions

Zhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang

PS-TRUST: Provably secure solution for truthful double spectrum auctions

Details
Discussion Comments: 0
Verification: Authors have not verified information

WiSlow: A Wi-Fi network performance troubleshooting tool for end users

Kyung-Hwa Kim, Hyunwoo Nam, Henning Schulzrinne

WiSlow: A Wi-Fi network performance troubleshooting tool for end users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-efficient cooperative broadcast in fading wireless networks

Chenxi Qiu, Haiying Shen, Lei Yu

Energy-efficient cooperative broadcast in fading wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Microeconomic analysis of base-station sharing in green cellular networks

Bingjie Leng, Parisa Mansourifard, Bhaskar Krishnamachari

Microeconomic analysis of base-station sharing in green cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-dimensional OFDMA scheduling in a wireless network with relay nodes

Reuven Cohen, Guy Grebla

Multi-dimensional OFDMA scheduling in a wireless network with relay nodes

Details
Discussion Comments: 0
Verification: Authors have not verified information

SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments

Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, Minglu Li

SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint static and dynamic traffic scheduling in data center networks

Zizhong Cao, Murali S. Kodialam, T. V. Lakshman

Joint static and dynamic traffic scheduling in data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security vulnerability and countermeasures of frequency offset correction in 802.11a systems

Hanif Rahbari, Marwan Krunz, Loukas Lazos

Security vulnerability and countermeasures of frequency offset correction in 802.11a systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Structured spectrum allocation and user association in heterogeneous cellular networks

Wei Bao, Ben Liang

Structured spectrum allocation and user association in heterogeneous cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, Junshan Zhang

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximate multiple count in Wireless Sensor Networks

Xiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li

Approximate multiple count in Wireless Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Learning in hide-and-seek

Qingsi Wang, Mingyan Liu

Learning in hide-and-seek

Details
Discussion Comments: 0
Verification: Authors have not verified information

A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks

Xingya Liu, Jiang Xie

A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving privacy preservation in WiFi fingerprint-based localization

Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng

Achieving privacy preservation in WiFi fingerprint-based localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

An approximation algorithm for client assignment in client/server systems

Yuqing Zhu, Weili Wu, James Willson, Ling Ding, Lidong Wu, Deying Li, Wonjun Lee

An approximation algorithm for client assignment in client/server systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

A general framework of hybrid graph sampling for complex network analysis

Xin Xu, Chul-Ho Lee, Do Young Eun

A general framework of hybrid graph sampling for complex network analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Provable per-link delay-optimal CSMA for general wireless network topology

Dongmyung Lee, Donggyu Yun, Jinwoo Shin, Yung Yi, Se-Young Yun

Provable per-link delay-optimal CSMA for general wireless network topology

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multiple heterogeneous data ferry trajectory planning in wireless sensor networks

Lirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang, Alade O. Tokuta

Multiple heterogeneous data ferry trajectory planning in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions

Tarun Bansal, Bo Chen, Prasun Sinha

FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems

Jian-Jhih Kuo, Hsiu-Hsien Yang, Ming-Jer Tsai

Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal collaborative access point association in wireless networks

Ouldooz Baghban Karimi, Jiangchuan Liu, Jennifer Rexford

Optimal collaborative access point association in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sojourn time approximations in a multi-class time-sharing server

Ane Izagirre, Urtzi Ayesta, Ina Maria Verloop

Sojourn time approximations in a multi-class time-sharing server

Details
Discussion Comments: 0
Verification: Authors have not verified information

Classifying call profiles in large-scale mobile traffic datasets

Diala Naboulsi, Razvan Stanica, Marco Fiore

Classifying call profiles in large-scale mobile traffic datasets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anchor-free backscatter positioning for RFID tags with high accuracy

Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu

Anchor-free backscatter positioning for RFID tags with high accuracy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users

Riheng Jia, Jinbei Zhang, Xinbing Wang, Xiaohua Tian, Qian Zhang

Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Restricted coverage in wireless networks

XiaoHua Xu, Min Song

Restricted coverage in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A deep investigation into network performance in virtual machine based cloud environments

Ryan Shea, Feng Wang, Haiyang Wang, Jiangchuan Liu

A deep investigation into network performance in virtual machine based cloud environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing

Tongjie Zhang, Zongpeng Li, Reihaneh Safavi-Naini

Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Delay guaranteed live migration of Virtual Machines

Jiao Zhang, Fengyuan Ren, Chuang Lin

Delay guaranteed live migration of Virtual Machines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards zero-time wakeup of line cards in power-aware routers

Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Bin Liu

Towards zero-time wakeup of line cards in power-aware routers

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the geographic patterns of a large-scale mobile video-on-demand system

Zhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Mohamed Ali Kâafar, Kavé Salamatian

On the geographic patterns of a large-scale mobile video-on-demand system

Details
Discussion Comments: 0
Verification: Authors have not verified information

NOVA: QoE-driven optimization of DASH-based video delivery in networks

Vinay Joseph, Gustavo de Veciana

NOVA: QoE-driven optimization of DASH-based video delivery in networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal Rate Sampling in 802.11 systems

Richard Combes, Alexandre Proutière, Donggyu Yun, Jungseul Ok, Yung Yi

Optimal Rate Sampling in 802.11 systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks

Jiliang Wang, Zhichao Cao, XuFei Mao, Yunhao Liu

Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics

Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng

FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast resource scheduling in HetNets with D2D support

Francesco Malandrino, Claudio Casetti, Carla-Fabiana Chiasserini, Zana Limani

Fast resource scheduling in HetNets with D2D support

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks

Liang He, Peng Cheng, Yu Gu, Jianping Pan, Ting Zhu, Cong Liu

Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Twins: Device-free object tracking using passive tags

Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang

Twins: Device-free object tracking using passive tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online allocation of virtual machines in a distributed cloud

Fang Hao, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee

Online allocation of virtual machines in a distributed cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying

Siddhartha Brahma, Melissa Duarte, Ayan Sengupta, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi

QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reducing forwarding state in content-centric networks with semi-stateless forwarding

Christos Tsilopoulos, George Xylomenos, Yannis Thomas

Reducing forwarding state in content-centric networks with semi-stateless forwarding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rendezvous for heterogeneous spectrum-agile devices

Shan-Hung Wu, Ching-Chan Wu, Wing-Kai Hon, Kang G. Shin

Rendezvous for heterogeneous spectrum-agile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal Combined Heat and Power system scheduling in smart grid

Kan Zhou, Jianping Pan, Lin Cai

Optimal Combined Heat and Power system scheduling in smart grid

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable Pending Interest Table design: From principles to practice

Haowei Yuan, Patrick Crowley

Scalable Pending Interest Table design: From principles to practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes

Guanfeng Liang, Ulas C. Kozat

TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spectrum-aware data replication in intermittently connected cognitive radio networks

Jing Zhao, Guohong Cao

Spectrum-aware data replication in intermittently connected cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction

Peng Lin, Xiaojun Feng, Qian Zhang

Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward profit-seeking virtual network embedding algorithm via global resource capacity

Long Gong, Yonggang Wen, Zuqing Zhu, Tony Lee

Toward profit-seeking virtual network embedding algorithm via global resource capacity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast and simple approximation algorithms for maximum weighted independent set of links

Peng-Jun Wan, Xiaohua Jia, Guojun Dai, Hongwei Du, Ophir Frieder

Fast and simple approximation algorithms for maximum weighted independent set of links

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pandaka: A lightweight cipher for RFID systems

Min Chen, Shigang Chen, Qingjun Xiao

Pandaka: A lightweight cipher for RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Markov chain fingerprinting to classify encrypted traffic

Maciej Korczynski, Andrzej Duda

Markov chain fingerprinting to classify encrypted traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information

3D pipeline contention: Asymmetric full duplex in wireless networks

Shaohe Lv, Xuan Dong, Yong Lu, Xiaoli Du, Xiaodong Wang, Yong Dou, Xingming Zhou

3D pipeline contention: Asymmetric full duplex in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

REIN: A fast event matching approach for content-based publish/subscribe systems

Shiyou Qian, Jian Cao, Yanmin Zhu, Minglu Li

REIN: A fast event matching approach for content-based publish/subscribe systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Meeting service level agreement cost-effectively for video-on-demand applications in the cloud

Yuhong Zhao, Hong Jiang, Ke Zhou, Zhijie Huang, Ping Huang

Meeting service level agreement cost-effectively for video-on-demand applications in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Montage: Combine frames with movement continuity for realtime multi-user tracking

Lan Zhang, Kebin Liu, Yonghang Jiang, Xiang-Yang Li, Yunhao Liu, Panlong Yang

Montage: Combine frames with movement continuity for realtime multi-user tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks

Xiaofei Wang, Min Chen, Zhu Han, Dapeng Oliver Wu, Ted Taekyoung Kwon

TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

PROMISE: A framework for truthful and profit maximizing spectrum double auctions

Dejun Yang, Xiang Zhang, Guoliang Xue

PROMISE: A framework for truthful and profit maximizing spectrum double auctions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Forwarding redundancy in opportunistic mobile networks: Investigation and elimination

Wei Gao, Qinghua Li, Guohong Cao

Forwarding redundancy in opportunistic mobile networks: Investigation and elimination

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-preserving high-quality map generation with participatory sensing

Xi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, Yunhao Liu

Privacy-preserving high-quality map generation with participatory sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Safe routing reconfigurations with route redistribution

Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure

Safe routing reconfigurations with route redistribution

Details
Discussion Comments: 0
Verification: Authors have not verified information

A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring

Xuefeng Liu, Jiannong Cao, Shaojie Tang, Peng Guo

A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

How can botnets cause storms? Understanding the evolution and impact of mobile botnets

Zhuo Lu, Wenye Wang, Cliff Wang

How can botnets cause storms? Understanding the evolution and impact of mobile botnets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms

Robert Margolies, Ashwin Sridharan, Vaneet Aggarwal, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan, Gil Zussman

Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the effect of forwarding table size on SDN network utilization

Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz

On the effect of forwarding table size on SDN network utilization

Details
Discussion Comments: 0
Verification: Authors have not verified information

DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information

Kang Chen, Haiying Shen

DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information

Details
Discussion Comments: 0
Verification: Authors have not verified information

Read bulk data from computational RFIDs

Yuanqing Zheng, Mo Li

Read bulk data from computational RFIDs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments

Yi Yuan, Dan Wang, Jiangchuan Liu

Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks

Reza Banirazi, Edmond A. Jonckheere, Bhaskar Krishnamachari

Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Connected wireless camera network deployment with visibility coverage

Hua Huang, Chien-Chun Ni, Xiaomeng Ban, Jie Gao, Andrew T. Schneider, Shan Lin

Connected wireless camera network deployment with visibility coverage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance evaluation and asymptotics for Content Delivery Networks

Virag Shah, Gustavo de Veciana

Performance evaluation and asymptotics for Content Delivery Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

EV-sounding: A visual assisted electronic channel sounding system

Gang Li, Jin Teng, Fan Yang, Adam C. Champion, Dong Xuan, Hong Luan, Yuan F. Zheng

EV-sounding: A visual assisted electronic channel sounding system

Details
Discussion Comments: 0
Verification: Authors have not verified information

HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing

Yang Peng, Kai Chen, Guohui Wang, Wei Bai, Zhiqiang Ma, Lin Gu

HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable forwarding tables for supporting flexible policies in enterprise networks

Shu Yang, Mingwei Xu, Dan Wang, Gautier Bayzelon, Jianping Wu

Scalable forwarding tables for supporting flexible policies in enterprise networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a statistical network calculus - Dealing with uncertainty in arrivals

Michael A. Beck, Sebastian A. Henningsen, Simon B. Birnbach, Jens B. Schmitt

Towards a statistical network calculus - Dealing with uncertainty in arrivals

Details
Discussion Comments: 0
Verification: Authors have not verified information

Does full-duplex double the capacity of wireless networks?

Xiufeng Xie, Xinyu Zhang

Does full-duplex double the capacity of wireless networks?

Details
Discussion Comments: 0
Verification: Authors have not verified information

On efficient bandwidth allocation for traffic variability in datacenters

Jian Guo, Fangming Liu, Xiaomeng Huang, John C. S. Lui, Mi Hu, Qiao Gao, Hai Jin

On efficient bandwidth allocation for traffic variability in datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

A social group utility maximization framework with applications in database assisted spectrum access

Xu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang

A social group utility maximization framework with applications in database assisted spectrum access

Details
Discussion Comments: 0
Verification: Authors have not verified information

Neptune: Efficient remote communication services for cloud backups

Yu Hua, Xue Liu, Dan Feng

Neptune: Efficient remote communication services for cloud backups

Details
Discussion Comments: 0
Verification: Authors have not verified information

WiFall: Device-free fall detection by wireless networks

Chunmei Han, Kaishun Wu, Yuxi Wang, Lionel M. Ni

WiFall: Device-free fall detection by wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fair energy-efficient sensing task allocation in participatory sensing with smartphones

Qingwen Zhao, Yanmin Zhu, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li

Fair energy-efficient sensing task allocation in participatory sensing with smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines

Shizhen Zhao, Xiaojun Lin

Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic content allocation for cloud-assisted service of periodic workloads

György Dán, Niklas Carlsson

Dynamic content allocation for cloud-assisted service of periodic workloads

Details
Discussion Comments: 0
Verification: Authors have not verified information

RollCaller: User-friendly indoor navigation system using human-item spatial relation

Yi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu

RollCaller: User-friendly indoor navigation system using human-item spatial relation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Preserving secondary users' privacy in cognitive radio networks

Zhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov

Preserving secondary users' privacy in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

RepFlow: Minimizing flow completion times with replicated flows in data centers

Hong Xu, Baochun Li

RepFlow: Minimizing flow completion times with replicated flows in data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Physical layer challenge-response authentication in wireless networks with relay

Xianru Du, Dan Shan, Kai Zeng, Lauren M. Huie

Physical layer challenge-response authentication in wireless networks with relay

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online algorithms for uploading deferrable big data to the cloud

Linquan Zhang, Zongpeng Li, Chuan Wu, Minghua Chen

Online algorithms for uploading deferrable big data to the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling

Florin Ciucu, Felix Poloczek, Jens B. Schmitt

Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system

Marco Valerio Barbera, Sokol Kosta, Alessandro Mei, Vasile Claudiu Perta, Julinda Stefa

Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling jobs with dwindling resource requirements in clouds

Sivan Albagli-Kim, Hadas Shachnai, Tami Tamir

Scheduling jobs with dwindling resource requirements in clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cell planning for heterogeneous networks: An approximation algorithm

Wentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu

Cell planning for heterogeneous networks: An approximation algorithm

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hitchhike: Riding control on preambles

Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu

Hitchhike: Riding control on preambles

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-Terabyte and multi-Gbps information centric routers

Giuseppe Rossini, Dario Rossi, Michele Garetto, Emilio Leonardi

Multi-Terabyte and multi-Gbps information centric routers

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Delay-constrained caching in cognitive radio networks

Jing Zhao, Wei Gao, Yi Wang, Guohong Cao

Delay-constrained caching in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed data storage systems with opportunistic repair

Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, Yih-Farn Robin Chen

Distributed data storage systems with opportunistic repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

Suave: Swarm underwater autonomous vehicle localization

Jun Liu, Zhaohui Wang, Zheng Peng, Jun-Hong Cui, Lance Fiondella

Suave: Swarm underwater autonomous vehicle localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Relax, but Do Not Sleep: A new perspective on Green Wireless Networking

Chenfei Gao, Weiyi Zhang, Jian Tang, Chonggang Wang, Shihong Zou, Sen Su

Relax, but Do Not Sleep: A new perspective on Green Wireless Networking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sonar inside your body: Prototyping ultrasonic intra-body sensor networks

Giuseppe Enrico Santagati, Tommaso Melodia

Sonar inside your body: Prototyping ultrasonic intra-body sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cross-layer path management in multi-path transport protocol for mobile devices

Yeon-sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley, Kang-Won Lee

Cross-layer path management in multi-path transport protocol for mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Can mobile cloudlets support mobile applications?

Yujin Li, Wenye Wang

Can mobile cloudlets support mobile applications?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliable video multicast over Wi-Fi networks with coordinated multiple APs

Munhwan Choi, Weiping Sun, Jonghoe Koo, Sunghyun Choi, Kang G. Shin

Reliable video multicast over Wi-Fi networks with coordinated multiple APs

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Transductive malware label propagation: Find your lineage from your neighbors

Deguang Kong, Guanhua Yan

Transductive malware label propagation: Find your lineage from your neighbors

Details
Discussion Comments: 0
Verification: Authors have not verified information

A reduction-based approach towards scaling up formal analysis of internet configurations

Anduo Wang, Alexander J. T. Gurney, Xianglong Han, Jinyan Cao, Boon Thau Loo, Carolyn L. Talcott, Andre Scedrov

A reduction-based approach towards scaling up formal analysis of internet configurations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming

Zhi Wang, Lifeng Sun, Chuan Wu, Wenwu Zhu, Shiqiang Yang

Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Competitive MAC under adversarial SINR

Adrian Ogierman, Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang

Competitive MAC under adversarial SINR

Details
Discussion Comments: 0
Verification: Authors have not verified information